-
1
-
-
84910660414
-
-
Bitcoin wiki: CVEs. https://en.bitcoin.it/wiki/CVEs#CVE-2010-5141.
-
Bitcoin Wiki: CVEs
-
-
-
3
-
-
84910598430
-
Fair two-party computations via the bitcoin deposits
-
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. Fair two-party computations via the bitcoin deposits. In First Workshop on Bitcoin Research, FC, 2014.
-
(2014)
First Workshop on Bitcoin Research, FC
-
-
Andrychowicz, M.1
Dziembowski, S.2
Malinowski, D.3
Mazurek, L.4
-
5
-
-
84892377298
-
Fair and efficient secure multiparty computation with reputation systems
-
Gilad Asharov, Yehuda Lindell, and Hila Zarosim. Fair and efficient secure multiparty computation with reputation systems. In Asiacrypt (2), pages 201-220, 2013.
-
(2013)
Asiacrypt
, vol.2
, pp. 201-220
-
-
Asharov, G.1
Lindell, Y.2
Zarosim, H.3
-
6
-
-
84871564300
-
Calling out cheaters: Covert security with public verifiability
-
Gilad Asharov and Claudio Orlandi. Calling out cheaters: Covert security with public verifiability. In Asiacrypt, pages 681-698, 2012.
-
(2012)
Asiacrypt
, pp. 681-698
-
-
Asharov, G.1
Orlandi, C.2
-
7
-
-
0000416796
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. In Eurocrypt, 1998.
-
(1998)
Eurocrypt
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
8
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Salil P. Vadhan, editor volume 4392 of LNCS, Springer, February 2007
-
Yonatan Aumann and Yehuda Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. In Salil P. Vadhan, editor, 4th Theory of Cryptography Conference-TCC 2007, volume 4392 of LNCS, pages 137-156. Springer, February 2007.
-
(2007)
4th Theory of Cryptography Conference-TCC
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
9
-
-
84940423444
-
Bitter to better-how to make bitcoin a better currency
-
S. Barber, X. Boyen, E. Shi, and E. Uzun. Bitter to better-how to make bitcoin a better currency. In FC, 2012.
-
(2012)
FC
-
-
Barber, S.1
Boyen, X.2
Shi, E.3
Uzun, E.4
-
10
-
-
65249147666
-
Incentivizing outsourced computation
-
Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Kupcu, and Anna Lysyanskaya. Incentivizing outsourced computation. In NetEcon, pages 85-90, 2008.
-
(2008)
NetEcon
, pp. 85-90
-
-
Belenkiy, M.1
Chase, M.2
Christopher Erway, C.3
Jannotti, J.4
Kupcu, A.5
Lysyanskaya, A.6
-
11
-
-
84945178660
-
How to use bitcoin to design fair protocols
-
Iddo Bentov and Ranjit Kumaresan. How to use bitcoin to design fair protocols. In ePrint 2014/129, 2014.
-
(2014)
EPrint 2014/ 129
-
-
Bentov, I.1
Kumaresan, R.2
-
12
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In Crypto (1), 2013.
-
(2013)
Crypto
, vol.1
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, M.5
Steiner, M.6
-
13
-
-
84884473382
-
Practical multlinear maps over the integers
-
J.-S. Coron, T. Lepoint, and M. Tibouchi. Practical multlinear maps over the integers. In Crypto (1), 2013.
-
(2013)
Crypto
, vol.1
-
-
Coron, J.-S.1
Lepoint, T.2
Tibouchi, M.3
-
15
-
-
84916216325
-
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
-
S. Garg, C. Gentry, S. Halevi, and D. Wichs. On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In ePrint 2013/860.
-
EPrint 2013/ 860
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Wichs, D.4
-
17
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Advances in Cryptology-Crypto 2010, 2010.
-
(2010)
Advances in Cryptology-Crypto 2010
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
20
-
-
84884477333
-
How to run turing machines on encrypted data
-
S. Goldwasser, Y. T Kalai, R.Ã. Popa, V. Vaikuntanathan, and N. Zeldovich. How to run turing machines on encrypted data. In Crypto (2), pages 536-553, 2013.
-
(2013)
Crypto
, vol.2
, pp. 536-553
-
-
Goldwasser, S.1
Kalai, Y.T.2
Popa, R.A.3
Vaikuntanathan, V.4
Zeldovich, N.5
-
21
-
-
84937555419
-
Uncheatable distributed computations
-
David Naccache, editor volume 2020 of LNCS, Springer, April 2001
-
Philippe Golle and Ilya Mironov. Uncheatable distributed computations. In David Naccache, editor, Cryptographers' Track-RSA 2001, volume 2020 of LNCS, pages 425-440. Springer, April 2001.
-
(2001)
Cryptographers' Track-RSA
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
23
-
-
84878348015
-
Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution
-
Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In IEEE Security and Privacy, pages 272-284, 2012.
-
(2012)
IEEE Security and Privacy
, pp. 272-284
-
-
Huang, Y.1
Katz, J.2
Evans, D.3
-
25
-
-
84889073373
-
Outsourced symmetric private information retrieval
-
S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner. Outsourced symmetric private information retrieval. In CCS, pages 875-888.
-
CCS
, pp. 875-888
-
-
Jarecki, S.1
Jutla, C.2
Krawczyk, H.3
Rosu, M.4
Steiner, M.5
-
27
-
-
64249101946
-
A proof of security of Yao's protocol for two-party computation
-
Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. Journal of Cryptology., 22(2):161-188, 2009.
-
(2009)
Journal of Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
29
-
-
84954474682
-
Efficiency tradeoffs for malicious two-party computation
-
P. Mohassel and M. Franklin. Efficiency tradeoffs for malicious two-party computation. In PKC 2006.
-
(2006)
PKC
-
-
Mohassel, P.1
Franklin, M.2
-
30
-
-
84914148700
-
Blind seer: A scalable private dbms
-
V. Pappas, B. Vo, F. Krell, S.-G. Choi, V. Kolesnikov, S. Bellovin, A. Keromytis, and T. Malkin. Blind seer: A scalable private dbms. In IEEE Security and Privacy, 2014.
-
(2014)
IEEE Security and Privacy
-
-
Pappas, V.1
Vo, B.2
Krell, F.3
Choi, S.-G.4
Kolesnikov, V.5
Bellovin, S.6
Keromytis, A.7
Malkin, T.8
-
35
-
-
0022882770
-
How to generate and exchange secrets (extended abstract
-
Andrew Yao. How to generate and exchange secrets (extended abstract). In FOCS, pages 162-167, 1986.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
|